rfc2252.Lightweight Directory Access Protocol (v3) Attribute Syntax Definitions

合集下载

《计算机网络基础与应用(第三版)》课后自我测试(参考答案)

《计算机网络基础与应用(第三版)》课后自我测试(参考答案)

《计算机网络基础与应用(第三版)》课后自我测试(参考答案)《计算机网络基础与应用》教材课后自我测试参考答案模块一计算机网络基础自我测试一、填空题1.计算机网络是将多个具有独立工作能力的计算机系统通过通信设备和线路由功能完善的网络软件实现资源共享和数据通信的系统。

2.计算机网络的发展分两阶段,即:面向终端的网络和计算机的网络。

3.计算机网络按分布距离分为:局域网、城域网和广域网。

4.局域网是指有限的地理范围内构作的计算机网络,它是计算机硬件和传输介质的结合,典型特征是位于一个建筑物或一个单位内。

英文简称LAN 。

5.在局域网中的计算机可分为两种角色。

即:工作站和服务器。

6.从网络架构方法看,局域网有3种类型对等网、工作站服务器网络和无盘工作站。

7.目前网络中经常接触到的3个团体是ISO 、ARPA 和IEEE 。

8.TCP/IP协议中,TCP是指传输控制协议,IP是指网际协议。

9.IEEE 802.3标准是关于有线以太网络的标准。

二、选择题1.下列哪方面是构作计算机网络不会涉及到的。

( C )A.计算机互联B.通信设备与传输介质C.计算机性能与交换技术D.网络软件,通信协议和网络操作系统(NOS)2.下列说法正确的是(BC )。

A.远程网就是通常说的InternetB.城域网构作距离在10Km~100KmC.局域网是速度最快的网络D.局域网只是计算机硬件和传输介质的结合,不需要其他辅助的东西。

3.下列哪项不是局域网的特点。

(D )A.网络的经营权和管理权属于某个单位B.通信处理一般由网卡完成C.网络所覆盖的地理范围比较小D.所有通信都可用4.局域网的基本组成部分中,下列哪项是没有的。

(A )A.网络基本结构B.计算机及智能型外围设备C.网络接口卡及电缆D.网络操作系统及有关软件三、判断题1.计算机网络是计算机与通讯技术密切结合的结果。

(对)2.在所有的网络中,局域网的传输距离最小。

(对)四、简答题1.计算机网络发展分几个阶段?各有什么特点?答:第一阶段计算机网络是以单个计算机为中心的远程联机系统,它是由一台计算机和多个终端组成的应用系统,网络终端无数据处理能力,只作为数据的输入输出。

LDAP协议

LDAP协议

LDAP协议与LDAP Server目录服务目录服务就是按照树状模式组织信息,实现信息管理和服务接口的一种方式。

目录服务中一般包括两个方面的内容:第一个组成部分是:数据库,这种数据库有别于日常所用到的关系型数据库,它是一种分布型的数据库,并且需要一个描述数据的规则;第二个组成部分是:访问和处理数据库的相关的协议。

目录服务和关系数据库不同,目录服务不支持批量更新事务处理能力,目录一般只执行简单的更新操作,适合于进行大量数据的检索;目录具有广泛的复制信息的能力,从而在缩短响应时间的同时,提高了可用性和可靠性;目前,目录服务技术的国际标准有两个,即较早的X.500标准和近年迅速发展的LDAP标准。

X.500虽然是一个完整协议群组,但是其目录访问协议DAP这种应用层的协议是严格按照复杂的ISO七层协议模型制定的,对相关层协议环境要求过多,主要运行在unix机器上,在许多小系统上,如PC和Macintosh(苹果机)上无法使用,因此没有多少人按照DAP开发应用程序,TCP/IP 协议体系的普及,更使得这种协议越来越不适应需要。

LDAP协议LDAP全称为Light Directory Access Protocol,轻量级目录访问协议,LDAP协议从1993年批准,有了V1版本,1997年发布了第三个版本LDAP v3,使得LDAP协议不仅仅做为X.500的简化版,同时提供了LDAP协议许多自有功能特性,LDAP V3协议也不是一个单一的协议,而是一个协议群组,包括内容如下:1,RFC2251-LDAP V3协议核心协议,定义了LDAP V3协议的基本模型和操作;2,RFC2252-定义了LDAP V3基本数据模式(Schema)以及标准的系统数据模式,Schema包括语法、匹配规则、属性类型和对象类;RFC2253-定义了LDAP V3中的分辨名(Differentiate Name, DN)表达方式;3,RFC2254-定义了LDAP V3中过滤器的表达方式;4,RFC2255-定义了LDAP V3中统一资源地址格式;5,RFC2256-定义了在LDAP V3中使用X.500的Schema列表;6,RFC2829-定义了LDAP V3的认证方式;7,RFC2830-定义了LDAP V3如何通过扩展使用TLS服务;8,RFC1823-定义了C的关于LDAP V3客户端开发接口;9,RFC2847-定义了LDAP数据导入、导出的文件接口LDIF;在这些协议中,主要定义了LDAP的内容,同时定义了信息模型,确定了LDAP目录中所存储的信息的格式和字符集,如何表示目录信息(定义对象类、属性、匹配规则和语法等模式)。

电子公文系统中基于LDAP访问控制的动态配置设计与实现

电子公文系统中基于LDAP访问控制的动态配置设计与实现

电子公文系统中基于LDAP访问控制的动态配置设计与实现【关键词】oa系统;动态配置;访问控制;管理安全;ldap1 ldap访问控制的概述随着近年来电子公文系统的广泛发展和应用,处理公文的功能实现越来越需要逼近现实。

处理公文的电子化势不可挡,建立电子公文系统也呈现白热化趋势。

而网络带给大家很多信息安全隐患,因此电子公文系统中也存在很多安全问题。

访问控制是指按用户身份及其归属的某项定义组来限制用户对某些信息项的访问,或限制对某些控制功能的使用。

访问控制通常用于系统管理员控制用户对服务器、目录、文件等网络资源的访问。

ldap的访问控制是指管理员对服务器中资源被浏览、修改、删除权限的配置。

论文背景的课题系统中ldap服务器用在公文系统和数据库之间,作为用户管理服务器使用。

ldap服务器的应用在很大程度上保证了数据库的安全,进而保障了公文系统的安全可靠。

访问控制权限是确定用户只能做到权限规定范围之内的操作,任何用户都不能越权操作。

对公文系统中的用户管理服务器进行动态配置访问控制权限是保证oa系统相对安全行之有效的方法之一。

oa系统中,访问控制是保证公文系统中数据库中的目录信息安全性的一种重要措施。

在ldap服务器中既可以发挥轻型目录访问协议本身的优势,进行快速的查询,修改,增加删除用户和资源的功能,还能进行配置用户的访问控制权限,即对服务器中的资源进行特定操作的权限的配置。

在一个完整安全的oa系统中,实现访问控制是该系统必须实现的功能,它不仅能设置用户的访问权限,而且提高了系统查询,运行的效率。

动态的实现访问控制技术又是目前最灵活方便,有效的方式,它避免了静态配置方式中时间,地域的限制。

一般的,配置用户管理服务器的访问控制权限是通过静态的控制服务器的启动和停止,配合修改slapd.conf文件配置实现的。

但是很多用户使用这种静态配置的方法都会遇到这样的问题:这种静态实现的方法是一种操作的方法,需要考虑实现周期,这是越来越不能被接受的。

RFC 2026

RFC 2026

Network Working Group T. HowesRequest for Comments: 2254 Netscape Communications Corp. Category: Standards Track December 1997The String Representation of LDAP Search Filters1. Status of this MemoThis document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions forimprovements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited.Copyright NoticeCopyright (C) The Internet Society (1997). All Rights Reserved. IESG NoteThis document describes a directory access protocol that provides both read and update access. Update access requires secureauthentication, but this document does not mandate implementation of any satisfactory authentication mechanisms.In accordance with RFC 2026, section 4.4.1, this specification is being approved by IESG as a Proposed Standard despite thislimitation, for the following reasons:a. to encourage implementation and interoperability testing ofthese protocols (with or without update access) before theyare deployed, andb. to encourage deployment and use of these protocols in read-only applications. (e.g. applications where LDAPv3 is used asa query language for directories which are updated by somesecure mechanism other than LDAP), andc. to avoid delaying the advancement and deployment of other Internet standards-track protocols which require the ability to query, but not update, LDAPv3 directory servers.Howes Standards Track [Page 1]RFC 2254 String Representation of LDAP December 1997Readers are hereby warned that until mandatory authenticationmechanisms are standardized, clients and servers written according to this specification which make use of update functionality areUNLIKELY TO INTEROPERATE, or MAY INTEROPERATE ONLY IF AUTHENTICATION IS REDUCED TO AN UNACCEPTABLY WEAK LEVEL.Implementors are hereby discouraged from deploying LDAPv3 clients or servers which implement the update functionality, until a Proposed Standard for mandatory authentication in LDAPv3 has been approved and published as an RFC.2. AbstractThe Lightweight Directory Access Protocol (LDAP) [1] defines anetwork representation of a search filter transmitted to an LDAP server. Some applications may find it useful to have a common way of representing these search filters in a human-readable form. This document defines a human-readable string format for representing LDAP search filters.This document replaces RFC 1960, extending the string LDAP filter definition to include support for LDAP version 3 extended matchfilters, and including support for representing the full range ofpossible LDAP search filters.Howes Standards Track [Page 2]RFC 2254 String Representation of LDAP December 19973. LDAP Search Filter DefinitionAn LDAPv3 search filter is defined in Section 4.5.1 of [1] asfollows:Filter ::= CHOICE {and [0] SET OF Filter,or [1] SET OF Filter,not [2] Filter,equalityMatch [3] AttributeValueAssertion,substrings [4] SubstringFilter,greaterOrEqual [5] AttributeValueAssertion,lessOrEqual [6] AttributeValueAssertion,present [7] AttributeDescription,approxMatch [8] AttributeValueAssertion,extensibleMatch [9] MatchingRuleAssertion}SubstringFilter ::= SEQUENCE {type AttributeDescription,SEQUENCE OF CHOICE {initial [0] LDAPString,any [1] LDAPString,final [2] LDAPString}}AttributeValueAssertion ::= SEQUENCE {attributeDesc AttributeDescription,attributeValue AttributeValue}MatchingRuleAssertion ::= SEQUENCE {matchingRule [1] MatchingRuleID OPTIONAL,type [2] AttributeDescription OPTIONAL,matchValue [3] AssertionValue,dnAttributes [4] BOOLEAN DEFAULT FALSE}AttributeDescription ::= LDAPStringAttributeValue ::= OCTET STRINGMatchingRuleID ::= LDAPStringAssertionValue ::= OCTET STRINGLDAPString ::= OCTET STRINGHowes Standards Track [Page 3]RFC 2254 String Representation of LDAP December 1997where the LDAPString above is limited to the UTF-8 encoding of the ISO 10646 character set [4]. The AttributeDescription is a string representation of the attribute description and is defined in [1]. The AttributeValue and AssertionValue OCTET STRING have the form defined in [2]. The Filter is encoded for transmission over anetwork using the Basic Encoding Rules defined in [3], withsimplifications described in [1].4. String Search Filter DefinitionThe string representation of an LDAP search filter is defined by the following grammar, following the ABNF notation defined in [5]. The filter format uses a prefix notation.filter = "(" filtercomp ")"filtercomp = and / or / not / itemand = "&" filterlistor = "|" filterlistnot = "!" filterfilterlist = 1*filteritem = simple / present / substring / extensiblesimple = attr filtertype valuefiltertype = equal / approx / greater / lessequal = "="approx = "~="greater = ">="less = "<="extensible = attr [":dn"] [":" matchingrule] ":=" value/ [":dn"] ":" matchingrule ":=" valuepresent = attr "=*"substring = attr "=" [initial] any [final]initial = valueany = "*" *(value "*")final = valueattr = AttributeDescription from Section 4.1.5 of [1] matchingrule = MatchingRuleId from Section 4.1.9 of [1]value = AttributeValue from Section 4.1.6 of [1]The attr, matchingrule, and value constructs are as described in thecorresponding section of [1] given above.Howes Standards Track [Page 4]RFC 2254 String Representation of LDAP December 1997If a value should contain any of the following charactersCharacter ASCII value---------------------------* 0x2a( 0x28) 0x29\ 0x5cNUL 0x00the character must be encoded as the backslash '\' character (ASCII 0x5c) followed by the two hexadecimal digits representing the ASCII value of the encoded character. The case of the two hexadecimaldigits is not significant.This simple escaping mechanism eliminates filter-parsing ambiguities and allows any filter that can be represented in LDAP to berepresented as a NUL-terminated string. Other characters besides the ones listed above may be escaped using this mechanism, for example, non-printing characters.For example, the filter checking whether the "cn" attribute contained a value with the character "*" anywhere in it would be represented as "(cn=*\2a*)".Note that although both the substring and present productions in the grammar above can produce the "attr=*" construct, this construct is used only to denote a presence filter.5. ExamplesThis section gives a few examples of search filters written using this notation.(cn=Babs Jensen)(!(cn=Tim Howes))(&(objectClass=Person)(|(sn=Jensen)(cn=Babs J*)))(o=univ*of*mich*)The following examples illustrate the use of extensible matching.(cn:1.2.3.4.5:=Fred Flintstone)(sn:dn:2.4.6.8.10:=Barney Rubble)(o:dn:=Ace Industry)(:dn:2.4.6.8.10:=Dino)Howes Standards Track [Page 5]RFC 2254 String Representation of LDAP December 1997The second example illustrates the use of the ":dn" notation toindicate that matching rule "2.4.6.8.10" should be used when making comparisons, and that the attributes of an entry's distinguished name should be considered part of the entry when evaluating the match.The third example denotes an equality match, except that DNcomponents should be considered part of the entry when doing the match.The fourth example is a filter that should be applied to anyattribute supporting the matching rule given (since the attr has beenleft off). Attributes supporting the matching rule contained in the DN should also be considered.The following examples illustrate the use of the escaping mechanism.(o=Parens R Us \28for all your parenthetical needs\29)(cn=*\2A*)(filename=C:\5cMyFile)(bin=\00\00\00\04)(sn=Lu\c4\8di\c4\87)The first example shows the use of the escaping mechanism torepresent parenthesis characters. The second shows how to represent a"*" in a value, preventing it from being interpreted as a substring indicator. The third illustrates the escaping of the backslashcharacter.The fourth example shows a filter searching for the four-byte value 0x00000004, illustrating the use of the escaping mechanism torepresent arbitrary data, including NUL characters.The final example illustrates the use of the escaping mechanism to represent various non-ASCII UTF-8 characters.6. Security ConsiderationsThis memo describes a string representation of LDAP search filters. While the representation itself has no known security implications, LDAP search filters do. They are interpreted by LDAP servers toselect entries from which data is retrieved. LDAP servers should take care to protect the data they maintain from unauthorized access.Howes Standards Track [Page 6]RFC 2254 String Representation of LDAP December 19977. References[1] Wahl, M., Howes, T., and S. Kille, "Lightweight Directory Access Protocol (v3)", RFC 2251, December 1997.[2] Wahl, M., Coulbeck, A., Howes, T., and S. Kille, "Lightweight Directory Access Protocol (v3): Attribute Syntax Definitions", RFC 2252, December 1997.[3] Specification of ASN.1 encoding rules: Basic, Canonical, and Distinguished Encoding Rules, ITU-T Recommendation X.690, 1994.[4] Yergeau, F., "UTF-8, a transformation format of Unicode and ISO 10646", RFC 2044, October 1996.[5] Crocker, D., "Standard for the Format of ARPA Internet TextMessages", STD 11, RFC 822, August 1982.8. Author's AddressTim HowesNetscape Communications Corp.501 E. Middlefield RoadMountain View, CA 94043USAPhone: +1 415 937-3419EMail: howes@Howes Standards Track [Page 7]RFC 2254 String Representation of LDAP December 19979. Full Copyright StatementCopyright (C) The Internet Society (1997). All Rights Reserved.This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose ofdeveloping Internet standards in which case the procedures forcopyrights defined in the Internet Standards process must befollowed, or as required to translate it into languages other than English.The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns.This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATIONHEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OFMERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Howes Standards Track [Page 8]。

rfc相关设置及使用

rfc相关设置及使用

rfc相关设置及使用RFC(Request for Comments)是一种用于定义互联网协议、标准和相关问题的文档。

RFC的格式由互联网工程任务组(IETF)统一规定,它们记录了网络技术的发展和演进过程。

在本文中,我们将介绍RFC相关的设置和使用。

1. 了解RFC的作用和历史:RFC是由IETF组织制定的一种标准化文档,它记录了互联网协议的设计、开发和演化过程。

RFC起源于20世纪60年代的ARPANET,是一种社区驱动的文档,通过共享和讨论来推动互联网技术的发展。

RFC文档旨在提供指南、建议和最佳实践,帮助网络技术人员解决问题。

2. 寻找和阅读RFC文档:RFC文档可以在互联网上免费获取,IETF的官方网站和其他资源库都有存档。

这些文档按照顺序编号,并且以RFC开头,比如RFC 791定义了IPv4协议。

通过搜索引擎或在IETF网站上使用关键词搜索,可以找到特定主题的RFC文档。

阅读RFC文档时,应该注意文档的状态,有一些可能已经被更新或废弃。

3. 使用RFC文档:RFC文档在网络技术的发展过程中起着重要的指导作用。

它们提供了协议规范、算法实现、安全性和隐私等方面的建议。

网络管理员、网络工程师和开发人员可以使用RFC文档来了解和理解特定协议或标准的设计原理和要求。

此外,RFC文档还常用于进行互联网协议的实现、编程和配置。

4. 参与RFC的制定过程:RFC并不是静止的文件,而是一个持续演进的过程。

任何人都可以参与到RFC的制定过程中。

要参与RFC的制定,可以加入IETF并参与相关的工作组或邮件列表。

通过这种方式,个人可以提出改进建议,参与讨论和标准化的制定。

5. 遵循RFC的指导原则:在网络技术领域,遵循RFC的指导原则是至关重要的。

这些指导原则包括设计原则、协议分层、安全性和互操作性等要求。

遵循RFC的指导原则可以确保网络协议的正确性、稳定性和可靠性,同时也可以促进网络技术的发展和创新。

总结起来,RFC在互联网技术领域起着重要的作用,它们记录了互联网协议的发展历程和指导原则。

LDAP简介

LDAP简介

科技部科技基础性工作专项资金重大项目研究成果项目名称:我国数字图书馆标准规范建设子项目名称:数字资源检索与应用标准规范研究项目编号:2002DEA20018研究成果类型:研究报告成果名称:LDAP协议应用指南成果编号:CDLS-S07-002成果版本:总项目组推荐稿成果提交日期:2003年2月撰写人:张智雄(中国科学院文献情报中心)项目版权声明本报告研究工作属于科技部科技基础性工作专项资金重大项目《我国数字图书馆标准规范建设》的一部分,得到科技部科技基础性工作专项资金资助,项目编号为2002DEA20018。

按照有关规定,国家和《我国数字图书馆标准规范建设》课题组拥有本报告的版权,依照《中华人民共和国著作权法》享有著作权。

本报告可以复制、转载、或在电子信息系统上做镜像,但在复制、转载或镜像时须注明真实作者和完整出处,并在明显地方标明“科技部科技基础性工作专项资金重大项目《我国数字图书馆标准规范建设》资助”的字样。

报告版权人不承担用户在使用本作品内容时可能造成的任何实际或预计的损失。

作者声明本报告作者谨保证本作品中出现的文字、图片、声音、剪辑和文后参考文献等内容的真实性和可靠性,愿按照《中华人民共和国著作权法》,承担本作品发布过程中的责任和义务。

科技部有关管理机构对于本作品内容所引发的版权、署名权的异议、纠纷不承担任何责任。

《我国数字图书馆标准规范建设》课题组网站()作为本报告的第一发表单位,并可向其他媒体推荐此作品。

在不发生重复授权的前提下,报告撰写人保留将经过修改的项目成果向正式学术媒体直接投稿的权利。

LDAP协议应用指南目 录1. 协议概述 (1)2. LDAP的特点和应用领域 (1)3. LDAP目录的优势 (2)1.协议概述LDAP(Lightweight Directory Access Protocol,轻量级目录存取协议)是目前广泛应用的目录协议。

在计算机中,目录被认为是一种特殊的数据库,也有人将其称为数据仓库(Data Repository),它被用于存储一定类型的经过整序的信息。

rfc2217协议内容

rfc2217协议内容

竭诚为您提供优质文档/双击可除rfc2217协议内容篇一:串口服务器410软件设计手册usR-tcp232-410软件设计手册文件版本:V1.0.1目录usR-tcp232-410软件设计手册................................................. ................................................... . (1)1.产品概述................................................. ................................................... ................................................... .. (3)1.1.产品简介.................................................................................................... . (3)1.2.功能特点................................................. ................................................... . (3)1.3.与旧的e45系列的兼容性声明................................................. ................................................... . (4)2.产品功能................................................. ................................................... ................................................... .. (5)2.1.tcpclient模式特性................................................. ................................................... (5)2.2.tcpserver模式特性................................................. ................................................... (7)2.3.udpclient模式特性................................................. ................................................... .. (8)2.4.udpserver模式特性................................................. ................................................... (10)2.5.httpdclient.................................... ................................................... . (11)2.6.Vcom应用模式................................................. ................................................... . (13)2.7.增值功能................................................. ................................................... .. (14)2.7.1.网页转串口功能................................................. ................................................... (14)2.7.2.自定义网页功能................................................. ................................................... (17)2.7.3.modbusRtu转modbustcp.......................................... ................................................... .182.7.4.串口打包机制................................................. ................................................... . (18)2.7.5.流量计算................................................. ................................................... (19)2.7.6.类RFc2217功能................................................. ................................................... (19)3.设置协议................................................. ................................................... ................................................... (21)3.1.网络设置协议................................................. ................................................... (21)3.1.1.设置参数的流程................................................. ................................................... (21)3.1.2.设置指令内容................................................. ................................................... . (21)3.1.3.返回指令内容................................................. ................................................... . (24)3.2.串口设置协议................................................. ................................................... (26)4.免责声明................................................. ................................................... ................................................... (26)5.更新历史................................................. ................................................... ................................................... (26)1.产品概述1.1.产品简介usR-tcp232-410是有人物联网技术有限公司推出的m4系列的串口服务器,是用来将tcp/udp数据包与Rs232/Rs485接口实现数据透明传输的设备。

rfc中常用的测试协议

rfc中常用的测试协议

rfc中常用的测试协议引言在计算机网络领域中,为了确保网络协议的正确性和稳定性,测试协议起到了至关重要的作用。

RFC(Request for Comments)是一系列文件,用于描述互联网相关协议、过程和技术。

在RFC中,也包含了一些常用的测试协议,用于验证和评估网络协议的功能和性能。

本文将介绍RFC中常用的测试协议,并深入探讨其原理和应用。

二级标题1:PING协议三级标题1.1:概述PING协议是一种常用的网络测试协议,用于测试主机之间的连通性。

它基于ICMP (Internet Control Message Protocol)协议,通过发送ICMP Echo Request报文并等待目标主机的ICMP Echo Reply报文来判断目标主机是否可达。

三级标题1.2:工作原理PING协议的工作原理如下: 1. 发送方主机生成一个ICMP Echo Request报文,并将目标主机的IP地址作为目的地。

2. 发送方主机将报文发送到网络中。

3.中间路由器收到报文后,将报文转发到下一跳路由器。

4. 目标主机收到ICMP Echo Request报文后,生成一个ICMP Echo Reply报文,并将其发送回发送方主机。

5. 发送方主机收到ICMP Echo Reply报文后,通过比较报文中的标识符和序列号等字段,判断目标主机是否可达。

三级标题1.3:应用场景PING协议在网络中的应用非常广泛,常用于以下场景: - 测试主机之间的连通性,判断网络是否正常工作。

- 测试网络延迟,通过计算ICMP Echo Request报文的往返时间来评估网络质量。

- 排查网络故障,通过检查ICMP Echo Reply报文中的错误码来定位故障原因。

二级标题2:Traceroute协议三级标题2.1:概述Traceroute协议用于跟踪数据包从源主机到目标主机经过的路径。

它通过发送一系列的UDP报文,并在每个报文中设置不同的TTL(Time to Live)值来实现。

LDAP使用手册

LDAP使用手册

LDAP使用手册1.LDAP介绍LDAP就是一种目录,或称为目录服务。

LDAP的英文全称是Lightweight Directory Access Protocol,即轻量级目录访问协议,是一个标准化的目录访问协议,它的核心规范在RFC中都有定义[16][17]。

LDAP基于一种叫做X.500的标准,X.500是由ITU-T和ISO定义的目录访问协议,专门提供一种关于组织成员的电子目录使得世界各地因特网访问权限内的任何人都可以访问该目录。

在X.500目录结构中,需要通过目录访问协议DAP,客户机通过DAP查询并接收来自服务器目录服务中的一台或多台服务器上的响应,从而实现对服务器和客户机之间的通信控制。

然而DAP需要大量的系统资源和支持机制来处理复杂的协议。

LDAP仅采纳了原始X.500目录存取协议DAP的功能子集而减少了所需的系统资源消耗,而且可以根据需要进行定制。

在实际的应用中,LDAP比X.500更为简单更为实用,所以LDAP技术发展得非常迅速。

目前在企业范围内实现的支持LDAP的系统可以让运行在几乎所有计算机平台上的所有应用程序从LDAP目录中获取信息,LDAP目录中也可以存储各种类型的数据,如:电子邮件地址、人力资源数据、公共密匙、联系人列表,系统配置信息、策略信息等。

此外,与X.500不同,LDAP支持TCP,这对当今Internet来讲是必须的。

目前己有包括微软、IBM在内的几十家大型软件公司支持LDAP技术。

1997年发布了第三个版本LDAPV3[17],它的出现是LDAP协议发展的一个重要转折,它使LDAP协议不仅仅作为X.500的简化版,同时提供了LDAP协议许多自有的特性,使LDAP协议功能更为完备,安全性更高,生命力更为强大。

1.1组成LDAP的四个模型组成LDAP的四个模型是:信息模型,命名模型,功能模型,安全模型。

1.1.1信息模型LDAP信息模型定义能够在目录中存储的数据类型和基本的信息单位。

rfc相关设置及使用

rfc相关设置及使用

rfc相关设置及使用摘要:一、RFC简介1.RFC的含义2.RFC的作用二、RFC相关设置1.RFC文件的存放位置2.RFC文件的命名规则3.RFC文件的权限设置三、RFC的使用方法1.RFC文件的查看2.RFC文件的编辑3.RFC文件的导入导出四、RFC的高级应用1.RFC模板的使用2.RFC文件的版本控制3.RFC与其他软件的协同工作正文:RFC(Request for Comments)是一种广泛应用于计算机领域的文档格式,它主要用于记录和共享各种计算机网络协议和技术规范。

作为一个重要的知识库,RFC对于网络工程师、程序员等IT从业者来说具有很高的参考价值。

本文将为您详细介绍RFC的相关设置及使用方法。

首先,我们需要了解RFC的基本概念。

RFC(Request for Comments)意为“请求评论”,是一种用于记录和共享计算机网络协议和技术规范的文档格式。

它起源于20世纪60年代的美国,如今已成为互联网领域最重要的知识库之一。

RFC文件通常由网络工程师、程序员等IT从业者编写,并经过专家评审和公开讨论,以确保其内容的准确性和可靠性。

接下来,我们来了解RFC相关设置。

RFC文件的存放位置通常在系统的“/etc/rfc”目录下。

文件的命名规则一般采用“RFC”加数字的形式,如“RFC1925”。

此外,文件的权限设置也很重要,一般来说,RFC文件应具有可读、可写和可执行的权限,以便于用户查看、编辑和执行。

在了解RFC的相关设置后,我们来学习RFC的使用方法。

首先,可以通过命令行或图形界面查看RFC文件的内容。

编辑RFC文件时,可以使用文本编辑器或专门的RFC编辑工具。

此外,RFC文件还可以导入导出,方便与其他软件协同工作。

在掌握RFC的基本使用方法后,我们可以进一步探索RFC的高级应用。

RFC模板可以帮助用户快速创建和编辑RFC文件。

此外,RFC文件还支持版本控制,可以方便地追踪文件的变更历史。

rfc中常用的测试协议

rfc中常用的测试协议

rfc中常用的测试协议摘要:1.RFC 简介2.RFC 中常用的测试协议a.网络协议测试1.网络数据包抓取和分析2.网络仿真和测试工具b.应用层协议测试1.HTTP 和HTTPS 测试2.FTP 和FTPS 测试3.SMTP 和SMTPS 测试c.安全协议测试1.TLS 和SSL 测试2.IPsec 测试d.传输协议测试1.TCP 和UDP 测试e.无线网络协议测试1.802.11 无线网络测试正文:RFC(Request for Comments)是一个用于讨论和记录互联网协议的标准文档系列。

在RFC 中,有许多常用的测试协议,这些协议用于确保互联网协议在实际应用中能够正常工作。

本文将详细介绍这些测试协议。

首先,RFC 中包含了大量的网络协议测试。

网络数据包抓取和分析是网络协议测试的基础,这对于诊断网络问题和优化网络性能至关重要。

此外,网络仿真和测试工具也是必不可少的,例如,网络模拟器(如NS-3)和测试平台(如Ixia)可以帮助工程师在实验室环境中模拟实际网络状况,从而对协议进行更严格的测试。

其次,应用层协议测试在RFC 中也占据重要地位。

HTTP 和HTTPS 是Web 应用中最常用的协议,有许多测试工具可以对它们的性能和安全性进行测试,例如,JMeter 和Locust 等负载测试工具。

此外,FTP 和FTPS、SMTP 和SMTPS 等传输协议也是常用的测试对象。

在安全协议方面,RFC 中包含了TLS 和SSL、IPsec 等协议的测试方法。

这些协议对于保护互联网数据传输的安全至关重要,因此需要进行严格的测试以确保其性能和安全性。

传输协议方面,TCP 和UDP 是互联网中最常用的传输协议,它们的测试方法也是RFC 中的重要内容。

TCP 测试关注可靠性和流量控制等方面,而UDP 测试则更注重数据传输速率和丢包率等指标。

最后,无线网络协议测试在RFC 中也有一定的比重。

例如,802.11 无线网络测试是评估无线局域网性能的关键。

LDAP中文学习手册

LDAP中文学习手册

LDAP使用手册一、LDAP介绍LDAP是轻量级目录访问协议的简称(Lightweight Directory Access Protocol).用于访问目录服务。

它是X.500目录访问协议的移植,但是简化了实现方法。

二、目录服务与关系数据库之间的区别a)目录查询操作比关系数据库有更高的效率,但是更新效率比关系数据库低b)目录不支持关系数据库那样的复杂查询,比如两个表的连接。

c)目录不支持多操作的事物完整性,没有方式确认一些操作是全部成功还是全部失败d)目录能够能好和更灵活的支持子查询和匹配查询e)目录协议更适合应用于广域网,比如因特网或者大型公司的网络f)目录的管理,配置,和调试比关系型数据库更简单g)在使用关系数据库之前,必须首先定义表结构(模式)才可以进行操作。

而目录中所使用的模式是由LDAP定义好的一系列类组成的。

对于目录中的每条记录中必须属于其中的一个类或者多个类。

这些类定义了该记录中可以存储的信息。

h)目录以对象的形式存储数据。

信息被组织成树型结构。

i)目录服务支持分布式存储结构,容易实现数据的扩展,能满足大容量存储的要求。

三、LDAP的优点1:可以存储在其它条件下很难存储的管理信息2:数据安全可靠,访问控制粒度细腻。

3:LDAP是一个标准的,开放的协议,具有平台无关性。

4:数据分布广,规模可灵活扩充。

5:LDAP目录服务器可以使任何一种开放源代码或商用的LDAP目录服务器。

四、LDAP模型LDAP模型是从X.500协议中继承过来的。

是LDAP的一个组成部分,用于指导客户如何使用目录服务LDAP 定义了四个模型,包括信息模型,命名模型,功能模型,安全模型。

1.LDAP 信息模型(LDAP information model)LDAP信息模型用于描述LDAP中信息的表达方式。

LDAP信息模型包含三部分Entries Attributes Values (条目属性值)Entry:Directry中最基本的信息单元,Entry中所包含的信息描述了现实世界中的一个真实的对象,在目录系统中它可以理解为,目录树中的一个节点。

云原生安全托管mss标准

云原生安全托管mss标准

云原生安全托管(Managed Security Service,简称MSS)是一种通过云服务提供商来管理和维护企业的安全需求的服务。

在云原生环境中,为了确保应用程序和数据的安全性,需要采取一系列的安全措施。

下面是云原生安全托管的一些标准和最佳实践:
1. 多租户隔离:云原生安全托管服务应该提供多租户隔离机制,确保不同客户之间的资源和数据得到有效隔离,防止信息泄露和横向渗透攻击。

2. 数据加密:云原生安全托管服务应该支持对存储在云上的数据进行加密,包括数据传输和数据存储的加密,以保护敏感数据免受未经授权的访问。

3. 身份认证与访问控制:云原生安全托管服务应该提供身份认证和访问控制机制,确保只有经过授权的用户可以访问相关的资源和服务。

4. 安全审计与监控:云原生安全托管服务应该具备完善的安全审计和监控功能,能够对系统的安全事件进行实时监测和记录,及时发现和应对安全威胁。

5. 漏洞管理与补丁更新:云原生安全托管服务应该定期进行漏洞扫描和评估,及时修补系统中的安全漏洞,并提供自动化的补丁更新机制,确保系统的安全性和稳定性。

6. 威胁情报与防护:云原生安全托管服务应该具备实时的威胁情报收集和分析能力,能够及时识别和应对各种新型的安全威胁。

综上所述,云原生安全托管服务需要遵循一系列的标准和最佳实践,以确保云原生环境中应用程序和数据的安全性。

这些标准包括多租户隔离、数据加密、身份认证与访问控制、安全审计与监控、漏洞管理与补丁更新以及威胁情报与防护等方面。

1。

Ldap文档_RFC2252+Attribute+Syntax+Definitions

Ldap文档_RFC2252+Attribute+Syntax+Definitions

版权信息:本文档版权由所有,可随意传播、打印及用于任何用途,必须保留本文档的所有版权信息及版本信息,同时不可对本文档的任何部分进行任何修改。

版本信息日期版本描述作者2004-02-16 v1.0 最初版本 保留随时对本文档的任何部分作出修改,而不事先通知使用者的权利。

Attribute Syntax Definitions属性语法定义1、本备忘录的状态(Status of this Memo)本文档定义了一个用于Internet通讯的Internet标准跟踪协议,为了发展的需要讨论和建议。

对于这个协议的状况和地位请参照Internet官方协议标准("Internet Official Protocol Standards"(STD 1))的当前版。

这个备忘录的传播是不受限制的。

版权提示(Copyright Notice)版权Internet组织(The Internet Society (1997))。

所有权利保留。

IESG提示(IESG Note)本文档描述将一种同时提供读和更新访问的目录访问协议。

更新访问需要安全认证,但这个文档并不强制实现任何安全认证机制。

与RFC2026的4.4.1节相同,本规范正在被IESG批准期间,作为被提议的标准,可能并不限于本文档所述内容。

原因如下:a、鼓励在它们被发布前,实现和交互测试这些协议(带有或没有更新访问);b、鼓励在只读的应用程序中配置和使用这些协议。

(例如,在某些应用程序中,目录的更新访问使用某些其它安全的机制而不是LDAP,而使用LDAPv3被作为对目录的查询语言);c、避免阻碍别的Internet标准追踪协议的发展和发布。

(这些协议需要LDAPv3的目录服务器的查询能力,而不是更新能力)需要警告读者的是,直到强制的验证机制被标准化之前,根据本规范编写的客户端和服务器实现了更新功能的话,它们的互操作性可能是不可靠的,或者仅提供在认证需要极度弱化的时候的互操作性。

RFC协议标准

RFC协议标准

标准参考文档链路层协议PPP(Point-to-Point Protocol):RFC 1332: The PPP Internet Protocol Control Protocol (IPCP)RFC 1334: PPP Authentication ProtocolsRFC 1552: The PPP Internetworking Packet Exchange Control Protocol (IPXCP) RFC 1570: PPP LCP Extensions(实现了其中的callback选项)RFC 1661: The Point-to-Point Protocol (PPP)RFC 1877: PPP Internet Protocol Control Protocol Extensions for Name Server AddressesRFC 1990: The PPP Multilink Protocol (MP)RFC 1994: PPP Challenge Handshake Authentication Protocol (CHAP)RFC 2509: IP Header Compression over PPPRFC 1962: The PPP Compression Control Protocol (CCP)RFC 1974: PPP Stac LZS Compression ProtocoldX25、LAPB(Link Access Protocol Balanced):RFC1613:Cisco Systems X.25 over TCP(XOT)RFC1598:PPP in X.25RFC1461:SNMP MIB extension for MultiProtocol Interconnect over X.25RFC1382: SNMP MIB Extension for the X.25 Packet LayerRFC1381: SNMP MIB Extension for X.25 LAPBRFC1356: Multiprotocol Interconnect on X.25 and ISDN in the Packet ModeRFC1236: IP to X.121 Address Mapping for DDNRFC1226: Internet Protocol Encapsulation of AX.25 FramesRFC1090: SMTP on X.25RFC1086: ISO-TP0 bridge between TCP and X.25RFC874: Critique of X.25RFC1236: IP to X.121 Address Mapping for DDNRFC1133: Routing between the NSFNET and the DDNCisco-HDLC:Cisco-HDLC是CISCO自己设计的一个协议,没有可参考的标准Frame Relay:RFC1294/1490: Multiprotocol Interconnect over Frame RelayRFC1293: Inverse Address Resolution Protocol(INARP)RFC1315: Management Information Base for Frame Relay DTEsITU-T Q933附录A:帧中继本地管理接口(LMI)协议ANSI T1.617附录D:帧中继本地管理接口(LMI)协议ISDN(Integrated Services Digital Network):ITU-T Q.931建议(网络层)ITU-T Q.921建议(链路层)IP层协议RFC791: Internet Protocol. (IP)RFC792: Internet Control Message Protocol (ICMP)RFC793: TRANSMISSION CONTROL PROTOCOL (TCP)RFC896: Congestion Control in IP/TCP InternetworksRFC768: User Datagram Protocol (UDP)RFC 826: An Ethernet Address Resolution Protocol (ARP)Socket: Unix标准路由协议RIP(Routing Information Protocol):RFC1058: Routing Information ProtocolRFC1723: RIP Version 2RFC2082: RIP-2 MD5 AuthenticationOSPF(Open Shortest Path First):RFC2328: OSPF Version 2RFC1793: Extending OSPF to Support Demand CircuitsIGRP(Interior Gateway Routing Protocol):IGRP协议无标准RFC,与CISCO保持兼容BGP(Border Gateway Protocol):RFC1771: A Border Gateway Protocol 4(BGP-4)RFC1772: Application of the Border Gateway Protocol in the Internet (BGP-4) RFC1965: Autonomous System Confederations for BGPRFC1966: BGP Route Reflection -- An alternative to full mesh IBGPRFC1997: BGP Community AttributeRFC2439: BGP Route Flap Damping网络安全RADIUS(Remote Authentication Dial In User Service):RFC2138: Remote Authentication Dial In User Service (RADIUS)RFC2139: RADIUS AccountingGRE(Generic Routing Encapsulation):RFC1701: Generic Roouting Encapsulation (老版本)RFC1702: Generic Routing Encapsulation over IPv4 networksRFC2784: Generic Roouting Encapsulation (新版本)RFC2667: IP Tunnel MIBIPSEC(IP Security):RFC1825: Security Architechure for the Internet Protocol (老版本)RFC2401: Security Architechure for the Internet Protocol (新版本)AH(Authentication Header)协议:RFC2402: IP Authentication HeaderRFC1321: The MD5 Message-Digest AlgorithmRFC2104: HMAC: Keyed-Hashing for Message AuthenticationRFC2085: IP Authentication with Replay PreventionRFC2403: The Use of HMAC-MD5-96 within ESP and AHRFC2404: The Use of HMAC-SHA-1-96 within ESP and AHESP(Encapsulating Security Payload):RFC2406: IP Encapsulating Security Payload (ESP)RFC2405: The ESP DES-CBC Cipher Algorithm With Explicit IVIKE(Internet Key Exchange):RFC2408:Internet Security Association and Key Management Protocol (ISAKMP) RFC2409:The Internet Key Exchange (IKE)RFC2407:The Internet IP Security Domain of Interpretation for ISAKMP (IPSEC DOI)L2TP(Layer 2 Tunnel Protocol):RFC2661:Layer 2 Tunnel ProtocolNAT(Network Address Translator):RFC1631:The IP Network Address Translator (NAT)RFC2663:IP Network Address Translator (NAT) Terminology and Considerations 网络管理SNMP(Simple Network Management Protocol):RFC 1157: Simple Network Management Protocol (SNMP)。

网络安全配置命令英语简称

网络安全配置命令英语简称

网络安全配置命令英语简称1. ACL (Access Control List) - 访问控制列表2. ARP (Address Resolution Protocol) - 地址解析协议3. BGP (Border Gateway Protocol) - 边界网关协议4. DHCP (Dynamic Host Configuration Protocol) - 动态主机配置协议5. DNS (Domain Name System) - 域名系统6. FTP (File Transfer Protocol) - 文件传输协议7. HTTP (Hypertext Transfer Protocol) - 超文本传输协议8. HTTPS (Hypertext Transfer Protocol Secure) - 安全超文本传输协议9. ICMP (Internet Control Message Protocol) - 互联网控制消息协议10. IP (Internet Protocol) - 网际协议11. IPSec (Internet Protocol Security) - 网际协议安全性12. NAT (Network Address Translation) - 网络地址转换13. NTP (Network Time Protocol) - 网络时间协议14. OSPF (Open Shortest Path First) - 开放最短路径优先路由协议15. PPP (Point-to-Point Protocol) - 点对点协议16. RARP (Reverse Address Resolution Protocol) - 反向地址解析协议17. SMTP (Simple Mail Transfer Protocol) - 简单邮件传输协议18. SNMP (Simple Network Management Protocol) - 简单网络管理协议19. SSH (Secure Shell) - 安全外壳协议20. SSL (Secure Sockets Layer) - 安全套接层21. TCP (Transmission Control Protocol) - 传输控制协议22. Telnet (Telecommunication Network) - 远程登录服务23. TFTP (Trivial File Transfer Protocol) - 简单文件传输协议24. UDP (User Datagram Protocol) - 用户数据报协议25. VLAN (Virtual Local Area Network) - 虚拟局域网26. VPN (Virtual Private Network) - 虚拟私人网络27. VRRP (Virtual Router Redundancy Protocol) - 虚拟路由器冗余协议28. WEP (Wired Equivalent Privacy) - 有线等效保密29. WPA (Wi-Fi Protected Access) - Wi-Fi保护接入30. WPA2 (Wi-Fi Protected Access II) - Wi-Fi保护接入II。

NetAppFAS2552-安装文档

NetAppFAS2552-安装文档

NetAppFAS2552-安装⽂档NetApp FAS2552 存储安装实施⼿册西安新丰站⼆零⼀六年七⽉⽬录1实施步骤 (3)1.1设备连接图 (3)1.2配置检查 (4)1.3初始化安装 (6)1.4基本安装配置 (6)2参数表 (9)2.1存储系统配置信息 (9)2.2存储空间划分信息 (11)3⽇常管理及配置 (13)3.1图形界⾯管理配置⼿册 (13)1 实施步骤1.1设备连接图设备内部连接图:光纤交换机A 光纤交换机BNetApp FAS2252-A NetApp FAS2252-BIBM ⼩型机A IBM ⼩型机B1.2 配置检查1) 磁盘检查和调整,查看磁盘ownership 情况:进⼊维护模式#disk show2)Data ONTAP OS 及FirmWare版本检查;以下为查看当前版本的⽅法:查看当前Data ONTAP OS 及FirmWare版本,例:# sysconfigNetApp Release 8.2.3P3 7-Mode: Tue Apr 28 14:48:22 PDT 2015System ID: 0537041594 (netapp-2); partner ID: 0537041546 (netapp-1) System Serial Number: 941614000031 (netapp-2)System Rev: E1System Storage Configuration: Single-Path HASystem ACP Connectivity: Partial ConnectivityBackplane Part Number: DS224Backplane Rev:Backplane Serial Number: 021*********slot 0: System Board 1.7 GHz (System Board XIX E1)Model Name: FAS2552Part Number: 111-01324Revision: E1Serial Number: 0316********BIOS version: 8.3.0Loader version: 4.3Processors: 4Processor ID: 0x106e4Microcode Version: 0x3Processor type: Intel(R) Xeon(R) CPU C3528 @ 1.73GHzMemory Size: 18432 MBMemory Attributes: HoistingNormal ECCNVMEM Size: 1280 MB of Main Memory UsedCMOS RAM Status: OKController: BService Processor Status: OnlineFirmware Version: 2.2.4Mgmt MAC Address: 00:A0:98:92:DF:ADEthernet Link: down, 10Mb, half duplexUsing DHCP: yesIPv4 configuration:IP Address: unknownNetmask: unknownGateway: unknownIPv6 configuration: Disabled3)Raid和Aggrate的建⽴系统缺省会建⽴aggr0,由3块磁盘,采⽤raid-dp⽅式构成。

sftp 认证 算法 -回复

sftp 认证 算法 -回复

sftp 认证算法-回复SFTP认证算法是用于在安全文件传输协议(SFTP)中对用户进行身份验证的一种方法。

SFTP是一种在SSH(Secure Shell)协议下运行的系统传输协议,对于保护敏感数据而言非常重要。

认证算法是用于验证用户身份的一系列流程和规则。

在SFTP中,认证算法具体包括以下几个步骤:1. 用户名和密码验证:用户在SFTP客户端输入用户名和密码后,这些信息会被发送到服务器端进行验证。

服务器会检查这些信息是否匹配,如果匹配则认为用户提供的是有效的身份凭证,并授予其访问权限。

在用户名和密码验证过程中,SFTP使用的加密机制通常是非对称加密(公钥加密),以保证在传输过程中用户的密码不会被窃取或篡改。

2. 密钥交换(Key Exchange):密钥交换是一种SFTP服务器和客户端之间建立安全连接的过程,确保数据的机密性和完整性。

在密钥交换过程中,服务器和客户端会协商出一个共享密钥,用于之后的数据传输加密。

密钥交换通常使用Diffie-Hellman密钥交换协议,该协议允许服务器和客户端协商出一个对于第三方来说是不可预测的共享密钥,以确保数据安全性。

另外,密钥交换过程中也会进行身份验证,以防止中间人攻击等安全威胁。

服务器和客户端会互相验证彼此的身份,确认双方是合法的通信方。

3. 公钥认证:公钥认证是一种基于非对称加密的身份验证方法。

在这种方法中,用户在SFTP客户端生成一对非对称密钥(公钥和私钥),将公钥传送到服务器端。

在认证过程中,服务器要求客户端使用相应的私钥对一段随机生成的挑战字符串进行签名,然后将签名结果返回给服务器。

服务器收到签名结果后,使用事先保存的公钥对签名进行验证,如果验证通过,则认为用户提供的是有效的身份凭证,并授予其访问权限。

公钥认证提供了更高的安全性,因为私钥不会被传输到网络上,只有公钥会用来进行认证,从而有效防止了中间人攻击和密码被窃取的风险。

4. 双因素认证:双因素认证是SFTP认证算法中的一种高级安全措施。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Network Working Group M. Wahl Request for Comments: 2252 Critical Angle Inc. Category: Standards Track A. Coulbeck Isode Inc. T. Howes Netscape Communications Corp. S. Kille Isode Limited December 1997 Lightweight Directory Access Protocol (v3):Attribute Syntax Definitions1. Status of this MemoThis document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions forimprovements. Please refer to the current edition of the "InternetOfficial Protocol Standards" (STD 1) for the standardization stateand status of this protocol. Distribution of this memo is unlimited. Copyright NoticeCopyright (C) The Internet Society (1997). All Rights Reserved.IESG NoteThis document describes a directory access protocol that providesboth read and update access. Update access requires secureauthentication, but this document does not mandate implementation of any satisfactory authentication mechanisms.In accordance with RFC 2026, section 4.4.1, this specification isbeing approved by IESG as a Proposed Standard despite thislimitation, for the following reasons:a. to encourage implementation and interoperability testing ofthese protocols (with or without update access) before theyare deployed, andb. to encourage deployment and use of these protocols in read-onlyapplications. (e.g. applications where LDAPv3 is used asa query language for directories which are updated by somesecure mechanism other than LDAP), andWahl, et. al. Standards Track [Page 1]c. to avoid delaying the advancement and deployment of other Internet standards-track protocols which require the ability to query, but not update, LDAPv3 directory servers.Readers are hereby warned that until mandatory authenticationmechanisms are standardized, clients and servers written according to this specification which make use of update functionality areUNLIKELY TO INTEROPERATE, or MAY INTEROPERATE ONLY IF AUTHENTICATION IS REDUCED TO AN UNACCEPTABLY WEAK LEVEL.Implementors are hereby discouraged from deploying LDAPv3 clients or servers which implement the update functionality, until a ProposedStandard for mandatory authentication in LDAPv3 has been approved and published as an RFC.2. AbstractThe Lightweight Directory Access Protocol (LDAP) [1] requires thatthe contents of AttributeValue fields in protocol elements be octetstrings. This document defines a set of syntaxes for LDAPv3, and the rules by which attribute values of these syntaxes are represented as octet strings for transmission in the LDAP protocol. The syntaxesdefined in this document are referenced by this and other documentsthat define attribute types. This document also defines the set ofattribute types which LDAP servers should support.3. OverviewThis document defines the framework for developing schemas fordirectories accessible via the Lightweight Directory Access Protocol. Schema is the collection of attribute type definitions, object class definitions and other information which a server uses to determinehow to match a filter or attribute value assertion (in a compareoperation) against the attributes of an entry, and whether to permit add and modify operations.Section 4 states the general requirements and notations for attribute types, object classes, syntax and matching rule definitions.Section 5 lists attributes, section 6 syntaxes and section 7 objectclasses.Additional documents define schemas for representing real-worldobjects as directory entries.Wahl, et. al. Standards Track [Page 2]4. General IssuesThis document describes encodings used in an Internet protocol.The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT","SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [4].Attribute Type and Object Class definitions are written in a stringrepresentation of the AttributeTypeDescription andObjectClassDescription data types defined in X.501(93) [3].Implementors are strongly advised to first read the description ofhow schema is represented in X.500 before reading the rest of thisdocument.4.1. Common Encoding AspectsFor the purposes of defining the encoding rules for attributesyntaxes, the following BNF definitions will be used. They are based on the BNF styles of RFC 822 [13].a = "a" / "b" / "c" / "d" / "e" / "f" / "g" / "h" / "i" /"j" / "k" / "l" / "m" / "n" / "o" / "p" / "q" / "r" /"s" / "t" / "u" / "v" / "w" / "x" / "y" / "z" / "A" /"B" / "C" / "D" / "E" / "F" / "G" / "H" / "I" / "J" /"K" / "L" / "M" / "N" / "O" / "P" / "Q" / "R" / "S" /"T" / "U" / "V" / "W" / "X" / "Y" / "Z"d = "0" / "1" / "2" / "3" / "4" /"5" / "6" / "7" / "8" / "9"hex-digit = d / "a" / "b" / "c" / "d" / "e" / "f" /"A" / "B" / "C" / "D" / "E" / "F"k = a / d / "-" / ";"p = a / d / """ / "(" / ")" / "+" / "," /"-" / "." / "/" / ":" / "?" / " "letterstring = 1*anumericstring = 1*danhstring = 1*kkeystring = a [ anhstring ]printablestring = 1*pWahl, et. al. Standards Track [Page 3]space = 1*" "whsp = [ space ]utf8 = <any sequence of octets formed from the UTF-8 [9] transformation of a character from ISO10646 [10]> dstring = 1*utf8qdstring = whsp "’" dstring "’" whspqdstringlist = [ qdstring *( qdstring ) ]qdstrings = qdstring / ( whsp "(" qdstringlist ")" whsp )In the following BNF for the string representation of OBJECTIDENTIFIERs, descr is the syntactic representation of an objectdescriptor, which consists of letters and digits, starting with aletter. An OBJECT IDENTIFIER in the numericoid format should nothave leading zeroes (e.g. "0.9.3" is permitted but "0.09.3" shouldnot be generated).When encoding ’oid’ elements in a value, the descr encoding optionSHOULD be used in preference to the numericoid. An object descriptor is a more readable alias for a number OBJECT IDENTIFIER, and these(where assigned and known by the implementation) SHOULD be used inpreference to numeric oids to the greatest extent possible. Examples of object descriptors in LDAP are attribute type, object class andmatching rule names.oid = descr / numericoiddescr = keystringnumericoid = numericstring *( "." numericstring )woid = whsp oid whsp; set of oids of either formoids = woid / ( "(" oidlist ")" )oidlist = woid *( "$" woid ); object descriptors used as schema element namesqdescrs = qdescr / ( whsp "(" qdescrlist ")" whsp )qdescrlist = [ qdescr *( qdescr ) ]Wahl, et. al. Standards Track [Page 4]qdescr = whsp "’" descr "’" whsp4.2. Attribute TypesThe attribute types are described by sample values for the subschema"attributeTypes" attribute, which is written in theAttributeTypeDescription syntax. While lines have been folded forreadability, the values transferred in protocol would not containnewlines.The AttributeTypeDescription is encoded according to the followingBNF, and the productions for oid, qdescrs and qdstring are given insection 4.1. Implementors should note that future versions of thisdocument may have expanded this BNF to include additional terms.Terms which begin with the characters "X-" are reserved for privateexperiments, and MUST be followed by a <qdstrings>.AttributeTypeDescription = "(" whspnumericoid whsp ; AttributeType identifier[ "NAME" qdescrs ] ; name used in AttributeType[ "DESC" qdstring ] ; description[ "OBSOLETE" whsp ][ "SUP" woid ] ; derived from this other; AttributeType[ "EQUALITY" woid ; Matching Rule name[ "ORDERING" woid ; Matching Rule name[ "SUBSTR" woid ] ; Matching Rule name[ "SYNTAX" whsp noidlen whsp ] ; see section 4.3[ "SINGLE-VALUE" whsp ] ; default multi-valued[ "COLLECTIVE" whsp ] ; default not collective[ "NO-USER-MODIFICATION" whsp ]; default user modifiable[ "USAGE" whsp AttributeUsage ]; default userApplicationswhsp ")"AttributeUsage ="userApplications" /"directoryOperation" /"distributedOperation" / ; DSA-shared"dSAOperation" ; DSA-specific, value depends on server Servers are not required to provide the same or any text in thedescription part of the subschema values they maintain. ServersSHOULD provide at least one of the "SUP" and "SYNTAX" fields for each AttributeTypeDescription.Servers MUST implement all the attribute types referenced in sections 5.1, 5.2 and 5.3.Wahl, et. al. Standards Track [Page 5]Servers MAY recognize additional names and attributes not listed inthis document, and if they do so, MUST publish the definitions of the types in the attributeTypes attribute of their subschema entries.Schema developers MUST NOT create attribute definitions whose namesconflict with attributes defined for use with LDAP in existingstandards-track RFCs.An AttributeDescription can be used as the value in a NAME part of an AttributeTypeDescription. Note that these are case insensitive.Note that the AttributeTypeDescription does not list the matchingrules which can can be used with that attribute type in anextensibleMatch search filter. This is done using thematchingRuleUse attribute described in section 4.5.This document refines the schema description of X.501 by requiringthat the syntax field in an AttributeTypeDescription be a stringrepresentation of an OBJECT IDENTIFIER for the LDAP string syntaxdefinition, and an optional indication of the maximum length of avalue of this attribute (defined in section 4.3.2).4.3. SyntaxesThis section defines general requirements for LDAP attribute valuesyntax encodings. All documents defining attribute syntax encodingsfor use with LDAP are expected to conform to these requirements.The encoding rules defined for a given attribute syntax must produce octet strings. To the greatest extent possible, encoded octetstrings should be usable in their native encoded form for displaypurposes. In particular, encoding rules for attribute syntaxesdefining non-binary values should produce strings that can bedisplayed with little or no translation by clients implementing LDAP. There are a few cases (e.g. audio) however, when it is not sensibleto produce a printable representation, and clients MUST NOT assumethat an unrecognized syntax is a string representation.In encodings where an arbitrary string, not a Distinguished Name, is used as part of a larger production, and other than as part of aDistinguished Name, a backslash quoting mechanism is used to escapethe following separator symbol character (such as "’", "$" or "#") if it should occur in that string. The backslash is followed by a pair of hexadecimal digits representing the next character. A backslashitself in the string which forms part of a larger syntax is alwaystransmitted as ’\5C’ or ’\5c’. An example is given in section 6.27. Wahl, et. al. Standards Track [Page 6]Syntaxes are also defined for matching rules whose assertion valuesyntax is different from the attribute value syntax.4.3.1 Binary Transfer of ValuesThis encoding format is used if the binary encoding is requested bythe client for an attribute, or if the attribute syntax name is"1.3.6.1.4.1.1466.115.121.1.5". The contents of the LDAPAttributeValue or AssertionValue field is a BER-encoded instance ofthe attribute value or a matching rule assertion value ASN.1 datatype as defined for use with X.500. (The first byte inside the OCTET STRING wrapper is a tag octet. However, the OCTET STRING is stillencoded in primitive form.)All servers MUST implement this form for both generating attributevalues in search responses, and parsing attribute values in add,compare and modify requests, if the attribute type is recognized and the attribute syntax name is that of Binary. Clients which requestthat all attributes be returned from entries MUST be prepared toreceive values in binary (e.g. userCertificate;binary), and SHOULDNOT simply display binary or unrecognized values to users.4.3.2. Syntax Object IdentifiersSyntaxes for use with LDAP are named by OBJECT IDENTIFIERs, which are dotted-decimal strings. These are not intended to be displayed tousers.noidlen = numericoid [ "{" len "}" ]len = numericstringThe following table lists some of the syntaxes that have been defined for LDAP thus far. The H-R column suggests whether a value in thatsyntax would likely be a human readable string. Clients and servers need not implement all the syntaxes listed here, and MAY implementother syntaxes.Other documents may define additional syntaxes. However, thedefinition of additional arbitrary syntaxes is strongly deprecatedsince it will hinder interoperability: today’s client and serverimplementations generally do not have the ability to dynamicallyrecognize new syntaxes. In most cases attributes will be definedwith the syntax for directory strings.Wahl, et. al. Standards Track [Page 7]Value being represented H-R OBJECT IDENTIFIER=================================================================ACI Item N 1.3.6.1.4.1.1466.115.121.1.1Access Point Y 1.3.6.1.4.1.1466.115.121.1.2Attribute Type Description Y 1.3.6.1.4.1.1466.115.121.1.3Audio N 1.3.6.1.4.1.1466.115.121.1.4Binary N 1.3.6.1.4.1.1466.115.121.1.5Bit String Y 1.3.6.1.4.1.1466.115.121.1.6Boolean Y 1.3.6.1.4.1.1466.115.121.1.7Certificate N 1.3.6.1.4.1.1466.115.121.1.8Certificate List N 1.3.6.1.4.1.1466.115.121.1.9Certificate Pair N 1.3.6.1.4.1.1466.115.121.1.10Country String Y 1.3.6.1.4.1.1466.115.121.1.11DN Y 1.3.6.1.4.1.1466.115.121.1.12Data Quality Syntax Y 1.3.6.1.4.1.1466.115.121.1.13Delivery Method Y 1.3.6.1.4.1.1466.115.121.1.14Directory String Y 1.3.6.1.4.1.1466.115.121.1.15DIT Content Rule Description Y 1.3.6.1.4.1.1466.115.121.1.16DIT Structure Rule Description Y 1.3.6.1.4.1.1466.115.121.1.17DL Submit Permission Y 1.3.6.1.4.1.1466.115.121.1.18DSA Quality Syntax Y 1.3.6.1.4.1.1466.115.121.1.19DSE Type Y 1.3.6.1.4.1.1466.115.121.1.20Enhanced Guide Y 1.3.6.1.4.1.1466.115.121.1.21Facsimile Telephone Number Y 1.3.6.1.4.1.1466.115.121.1.22Fax N 1.3.6.1.4.1.1466.115.121.1.23Generalized Time Y 1.3.6.1.4.1.1466.115.121.1.24Guide Y 1.3.6.1.4.1.1466.115.121.1.25IA5 String Y 1.3.6.1.4.1.1466.115.121.1.26INTEGER Y 1.3.6.1.4.1.1466.115.121.1.27JPEG N 1.3.6.1.4.1.1466.115.121.1.28LDAP Syntax Description Y 1.3.6.1.4.1.1466.115.121.1.54LDAP Schema Definition Y 1.3.6.1.4.1.1466.115.121.1.56LDAP Schema Description Y 1.3.6.1.4.1.1466.115.121.1.57Master And Shadow Access Points Y 1.3.6.1.4.1.1466.115.121.1.29Matching Rule Description Y 1.3.6.1.4.1.1466.115.121.1.30Matching Rule Use Description Y 1.3.6.1.4.1.1466.115.121.1.31Mail Preference Y 1.3.6.1.4.1.1466.115.121.1.32MHS OR Address Y 1.3.6.1.4.1.1466.115.121.1.33Modify Rights Y 1.3.6.1.4.1.1466.115.121.1.55Name And Optional UID Y 1.3.6.1.4.1.1466.115.121.1.34Name Form Description Y 1.3.6.1.4.1.1466.115.121.1.35Numeric String Y 1.3.6.1.4.1.1466.115.121.1.36Object Class Description Y 1.3.6.1.4.1.1466.115.121.1.37Octet String Y 1.3.6.1.4.1.1466.115.121.1.40OID Y 1.3.6.1.4.1.1466.115.121.1.38Other Mailbox Y 1.3.6.1.4.1.1466.115.121.1.39Postal Address Y 1.3.6.1.4.1.1466.115.121.1.41Protocol Information Y 1.3.6.1.4.1.1466.115.121.1.42 Wahl, et. al. Standards Track [Page 8]Presentation Address Y 1.3.6.1.4.1.1466.115.121.1.43Printable String Y 1.3.6.1.4.1.1466.115.121.1.44Substring Assertion Y 1.3.6.1.4.1.1466.115.121.1.58Subtree Specification Y 1.3.6.1.4.1.1466.115.121.1.45Supplier Information Y 1.3.6.1.4.1.1466.115.121.1.46Supplier Or Consumer Y 1.3.6.1.4.1.1466.115.121.1.47Supplier And Consumer Y 1.3.6.1.4.1.1466.115.121.1.48Supported Algorithm N 1.3.6.1.4.1.1466.115.121.1.49Telephone Number Y 1.3.6.1.4.1.1466.115.121.1.50Teletex Terminal Identifier Y 1.3.6.1.4.1.1466.115.121.1.51Telex Number Y 1.3.6.1.4.1.1466.115.121.1.52UTC Time Y 1.3.6.1.4.1.1466.115.121.1.53A suggested minimum upper bound on the number of characters in value with a string-based syntax, or the number of bytes in a value for all other syntaxes, may be indicated by appending this bound count inside of curly braces following the syntax name’s OBJECT IDENTIFIER in anAttribute Type Description. This bound is not part of the syntaxname itself. For instance, "1.3.6.4.1.1466.0{64}" suggests thatserver implementations should allow a string to be 64 characterslong, although they may allow longer strings. Note that a singlecharacter of the Directory String syntax may be encoded in more than one byte since UTF-8 is a variable-length encoding.4.3.3. Syntax DescriptionThe following BNF may be used to associate a short description with a syntax OBJECT IDENTIFIER. Implementors should note that futureversions of this document may expand this definition to includeadditional terms. Terms whose identifier begins with "X-" arereserved for private experiments, and MUST be followed by a<qdstrings>.SyntaxDescription = "(" whspnumericoid whsp[ "DESC" qdstring ]whsp ")"4.4. Object ClassesThe format for representation of object classes is defined in X.501[3]. In general every entry will contain an abstract class ("top" or "alias"), at least one structural object class, and zero or moreauxiliary object classes. Whether an object class is abstract,structural or auxiliary is defined when the object class identifieris assigned. An object class definition should not be changedwithout having a new identifier assigned to it.Wahl, et. al. Standards Track [Page 9]Object class descriptions are written according to the following BNF. Implementors should note that future versions of this document mayexpand this definition to include additional terms. Terms whoseidentifier begins with "X-" are reserved for private experiments, and MUST be followed by a <qdstrings> encoding.ObjectClassDescription = "(" whspnumericoid whsp ; ObjectClass identifier[ "NAME" qdescrs ][ "DESC" qdstring ][ "OBSOLETE" whsp ][ "SUP" oids ] ; Superior ObjectClasses[ ( "ABSTRACT" / "STRUCTURAL" / "AUXILIARY" ) whsp ]; default structural[ "MUST" oids ] ; AttributeTypes[ "MAY" oids ] ; AttributeTypeswhsp ")"These are described as sample values for the subschema"objectClasses" attribute for a server which implements the LDAPschema. While lines have been folded for readability, the valuestransferred in protocol would not contain newlines.Servers SHOULD implement all the object classes referenced in section 7, except for extensibleObject, which is optional. Servers MAYimplement additional object classes not listed in this document, and if they do so, MUST publish the definitions of the classes in theobjectClasses attribute of their subschema entries.Schema developers MUST NOT create object class definitions whosenames conflict with attributes defined for use with LDAP in existing standards-track RFCs.4.5. Matching RulesMatching rules are used by servers to compare attribute valuesagainst assertion values when performing Search and Compareoperations. They are also used to identify the value to be added or deleted when modifying entries, and are used when comparing apurported distinguished name with the name of an entry.Most of the attributes given in this document will have an equalitymatching rule defined.Matching rule descriptions are written according to the followingBNF. Implementors should note that future versions of this document may have expanded this BNF to include additional terms. Terms whose identifier begins with "X-" are reserved for private experiments, and Wahl, et. al. Standards Track [Page 10]MUST be followed by a <qdstrings> encoding.MatchingRuleDescription = "(" whspnumericoid whsp ; MatchingRule identifier[ "NAME" qdescrs ][ "DESC" qdstring ][ "OBSOLETE" whsp ]"SYNTAX" numericoidwhsp ")"Values of the matchingRuleUse list the attributes which are suitable for use with an extensible matching rule.MatchingRuleUseDescription = "(" whspnumericoid whsp ; MatchingRule identifier[ "NAME" qdescrs ][ "DESC" qdstring ][ "OBSOLETE" ]"APPLIES" oids ; AttributeType identifierswhsp ")"Servers which support matching rules and the extensibleMatch SHOULDimplement all the matching rules in section 8.Servers MAY implement additional matching rules not listed in thisdocument, and if they do so, MUST publish the definitions of thematching rules in the matchingRules attribute of their subschemaentries. If the server supports the extensibleMatch, then the server MUST publish the relationship between the matching rules andattributes in the matchingRuleUse attribute.For example, a server which implements a privately-defined matchingrule for performing sound-alike matches on Directory String-valuedattributes would include the following in the subschema entry(1.2.3.4.5 is an example, the OID of an actual matching rule would be different):matchingRule: ( 1.2.3.4.5 NAME ’soundAlikeMatch’SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )If this matching rule could be used with the attributes 2.5.4.41 and 2.5.4.15, the following would also be present:matchingRuleUse: ( 1.2.3.4.5 APPLIES (2.5.4.41 $ 2.5.4.15) )Wahl, et. al. Standards Track [Page 11]A client could then make use of this matching rule by sending asearch operation in which the filter is of the extensibleMatchchoice, the matchingRule field is "soundAlikeMatch", and the typefield is "2.5.4.41" or "2.5.4.15".5. Attribute TypesAll LDAP server implementations MUST recognize the attribute typesdefined in this section.Servers SHOULD also recognize all the attributes from section 5 of[12].5.1. Standard Operational AttributesServers MUST maintain values of these attributes in accordance withthe definitions in X.501(93).5.1.1. createTimestampThis attribute SHOULD appear in entries which were created using the Add operation.( 2.5.18.1 NAME ’createTimestamp’ EQUALITY generalizedTimeMatchORDERING generalizedTimeOrderingMatchSYNTAX 1.3.6.1.4.1.1466.115.121.1.24SINGLE-VALUE NO-USER-MODIFICATION USAGE directoryOperation )5.1.2. modifyTimestampThis attribute SHOULD appear in entries which have been modifiedusing the Modify operation.( 2.5.18.2 NAME ’modifyTimestamp’ EQUALITY generalizedTimeMatchORDERING generalizedTimeOrderingMatchSYNTAX 1.3.6.1.4.1.1466.115.121.1.24SINGLE-VALUE NO-USER-MODIFICATION USAGE directoryOperation )5.1.3. creatorsNameThis attribute SHOULD appear in entries which were created using the Add operation.( 2.5.18.3 NAME ’creatorsName’ EQUALITY distinguishedNameMatchSYNTAX 1.3.6.1.4.1.1466.115.121.1.12SINGLE-VALUE NO-USER-MODIFICATION USAGE directoryOperation ) Wahl, et. al. Standards Track [Page 12]This attribute SHOULD appear in entries which have been modifiedusing the Modify operation.( 2.5.18.4 NAME ’modifiersName’ EQUALITY distinguishedNameMatchSYNTAX 1.3.6.1.4.1.1466.115.121.1.12SINGLE-VALUE NO-USER-MODIFICATION USAGE directoryOperation )5.1.5. subschemaSubentryThe value of this attribute is the name of a subschema entry (orsubentry if the server is based on X.500(93)) in which the servermakes available attributes specifying the schema.( 2.5.18.10 NAME ’subschemaSubentry’EQUALITY distinguishedNameMatchSYNTAX 1.3.6.1.4.1.1466.115.121.1.12 NO-USER-MODIFICATIONSINGLE-VALUE USAGE directoryOperation )5.1.6. attributeTypesThis attribute is typically located in the subschema entry.( 2.5.21.5 NAME ’attributeTypes’EQUALITY objectIdentifierFirstComponentMatchSYNTAX 1.3.6.1.4.1.1466.115.121.1.3 USAGE directoryOperation )5.1.7. objectClassesThis attribute is typically located in the subschema entry.( 2.5.21.6 NAME ’objectClasses’EQUALITY objectIdentifierFirstComponentMatchSYNTAX 1.3.6.1.4.1.1466.115.121.1.37 USAGE directoryOperation )5.1.8. matchingRulesThis attribute is typically located in the subschema entry.( 2.5.21.4 NAME ’matchingRules’EQUALITY objectIdentifierFirstComponentMatchSYNTAX 1.3.6.1.4.1.1466.115.121.1.30 USAGE directoryOperation ) Wahl, et. al. Standards Track [Page 13]This attribute is typically located in the subschema entry.( 2.5.21.8 NAME ’matchingRuleUse’EQUALITY objectIdentifierFirstComponentMatchSYNTAX 1.3.6.1.4.1.1466.115.121.1.31 USAGE directoryOperation )5.2. LDAP Operational AttributesThese attributes are only present in the root DSE (see [1] and [3]).Servers MUST recognize these attribute names, but it is not required that a server provide values for these attributes, when the attribute corresponds to a feature which the server does not implement.5.2.1. namingContextsThe values of this attribute correspond to naming contexts which this server masters or shadows. If the server does not master anyinformation (e.g. it is an LDAP gateway to a public X.500 directory) this attribute will be absent. If the server believes it containsthe entire directory, the attribute will have a single value, andthat value will be the empty string (indicating the null DN of theroot). This attribute will allow a client to choose suitable baseobjects for searching when it has contacted a server.( 1.3.6.1.4.1.1466.101.120.5 NAME ’namingContexts’SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 USAGE dSAOperation )5.2.2. altServerThe values of this attribute are URLs of other servers which may becontacted when this server becomes unavailable. If the server doesnot know of any other servers which could be used this attribute will be absent. Clients may cache this information in case their preferred LDAP server later becomes unavailable.( 1.3.6.1.4.1.1466.101.120.6 NAME ’altServer’SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 USAGE dSAOperation )5.2.3. supportedExtensionThe values of this attribute are OBJECT IDENTIFIERs identifying thesupported extended operations which the server supports.If the server does not support any extensions this attribute will be absent.Wahl, et. al. Standards Track [Page 14]。

相关文档
最新文档